http://www.rsaconference.com/rss/videos.rss
RSA Conference VideosThe latest videos from RSA Conference2015 RSA ConferenceGenericen-USSun, 02 Aug 2015 08:06:46 EDTGetting Your Session Proposal Accepted in 2016Tue, 04 Aug 2015 12:00:00 EDT<p><span>Improve your chances of becoming a speaker for RSA Conference 2016! Get the inside track on Conference requirements and how to increase your visibility amongst the Program Committee.</span></p>
<p>This webcast will cover the details of the RSA Conference 2016 Call for Speakers submission process. Dr. Hugh Thompson, Program Committee Chairman, RSA Conference and Britta Glade, Content Manager, RSA Conference will provide a detailed understanding of how the selection process works.</p>
<p class="Arial10"><span>Plan to join us on August 4 for this online event! </span></p>http://www.rsaconference.com/media/getting-your-session-proposal-accepted-in-2016
Meet and Greet with Kailash SatyarthiThu, 30 Jul 2015 12:00:00 EDT<p>Linda Gray, General Manager of RSA Conference speaks with our closing keynote speaker from RSA Conference Asia Pacific and Japan 2015, Mr. Kailash Satyarthi.</p>http://www.rsaconference.com/media/meet-and-greet-with-kailash-satyarthi
Meet and Greet with Jim ReavisWed, 29 Jul 2015 12:00:00 EDT<p>Britta Glade, Senior Content Manager for RSA Conference speaks with Jim Reavis about his session, Security Lessons Learned: Enterprise Adoption of Cloud Computing" at RSA Conference APJ 2015 in Singapore.</p>http://www.rsaconference.com/media/meet-and-greet-with-jim-reavis
Meet and Greet with RSAC APJ 2015 Innovation Sandbox WinnersTue, 28 Jul 2015 12:00:00 EDT<p>Hugh Thompson, Program Committee Chair and Innovation Sandbox judge, speaks with this year's winner of the Asia Pacific and Japan Innovation Sandbox, <a href="https://www.soda-it.com/" target="_blank">SODA</a>.</p>http://www.rsaconference.com/media/meet-and-greet-with-rsac-apj-2015-innovation-sandbox-winners
Meet and Greet with Ben DoyleMon, 27 Jul 2015 12:00:00 EDT<p>Fahmida Rashid, Editor-in-Chief of RSA Conference speaks with Ben Doyle, Program Chair for RSA Conference Asia Pacific and Japan.</p>http://www.rsaconference.com/media/meet-and-greet-with-ben-doyle
Meet and Greet with Mike McConnell and Christopher LingFri, 24 Jul 2015 12:00:00 EDT<p>Fahmida Rashid, Editor-in-Chief of RSA Conference speaks with Mike McConnell and Christopher Ling about their session "What Do You Do When the Alarm Sounds? Managing Cyber Crises" at RSA Conference APJ 2015.</p>http://www.rsaconference.com/media/meet-and-greet-with-mike-mcconnell-and-christopher-ling
Meet and Greet with Tobias FeakinFri, 24 Jul 2015 12:00:00 EDT<p>Fahmida Rashid, Editor-in-Chief of RSA Conference speaks with Tobias Feakin about his session, "Unpacking Asia-Pacific Cyber Maturity" at RSA Conference APJ 2015 in Singapore.</p>http://www.rsaconference.com/media/meet-and-greet-with-tobias-feakin
Detection of Advanced Attacks with a CPU Level Sandbox TechnologyThu, 23 Jul 2015 12:00:00 EDT<p>First generation OS level Sandbox technology has been around for some time now, allowing organizations to automatically inspect every file passing through their perimeter. Since the introduction of the sandbox concept, the attackers have developed a wide array of evasion techniques, designed to allow their attack to bypass the sandbox inspection and reach the target systems. However, there is another point in time during the infection process that can always be detected if you know what to look for, and is virtually impossible to evade: the Exploit phase. In this session, we will elaborate on a new approach – a CPU level sandbox that can better detect the most advanced attacks, even when they deploy evasion techniques - by monitoring the CPU activity while the exploit occurs.</p>http://www.rsaconference.com/media/detection-of-advanced-attacks-with-a-cpu-level-sandbox-technology
Meet and Greet with Leonard OngThu, 23 Jul 2015 12:00:00 EDT<p>Britta Glade, Senior Content Manager for RSA Conference speaks with Leonard Ong, KnowledgeNet Chair, IAPP about his session "Hot Topics in Privacy: A Conversation with Privacy Leaders" at RSA Conference Asia Pacific and Japan 2015.</p>http://www.rsaconference.com/media/meet-and-greet-with-leonard-ong
Meet and Greet with Zulfikar RamzanThu, 23 Jul 2015 12:00:00 EDT<p>Fahmida Rashid, Editor-in-Chief for RSA Conference speaks with Zulfikar Ramzan, CTO, RSA Security, about his session "You’ve Done Everything Right, and Still There’s a Breach. Now What?" at RSA Conference Asia Pacific and Japan 2015.</p>http://www.rsaconference.com/media/meet-and-greet-with-zulfikar-ramzan
Securing the Next-Generation Data CenterThu, 23 Jul 2015 12:00:00 EDT<p>Enterprise data centers are seeing change like never before. As reliance on public clouds and IaaS are becoming more common, buyers need to re-architect their data centers and deploy a security strategy that not only adapts to new network architectures and tremendous performance increases, but one that can also stand up to increasingly powerful and deceptive attacks. This session will address how security can be applied to different workloads within and beyond the Data Center into the public cloud.</p>http://www.rsaconference.com/media/securing-the-next-generation-data-center
Cloud Without Borders: Paving the Way for Global Security and PrivacyWed, 22 Jul 2015 12:00:00 EDT<p>Technology innovation is changing the way we conduct business and our lives in ways that are hard to predict. Cloud technologies are changing our networks and how we communicate in this hyper connected world, bringing security and privacy to the forefront. Philippe discusses how we can leverage the cloud as a new foundation for cyber security to ensure data security and sovereignty across borders.</p>http://www.rsaconference.com/media/cloud-without-borders-paving-the-way-for-global-security-and-privacy
Getting Ahead of CybercrimeWed, 22 Jul 2015 12:00:00 EDT<p>In most organizations, cyber threats are increasing faster than the ability to implement security improvements. Even organizations employing good cyber practices are being penetrated — advanced organizations plan for it. So in an environment where you can be under cyber attack and not even know, what can you do? EY believes that to get ahead of cybercrime you need to focus on a three-stage strategy: Activate, Adapt, Anticipate.</p>http://www.rsaconference.com/media/getting-ahead-of-cybercrime
Targeted Attacks, APT’s & Cyberwar - A MKT Buzz or a Real Business Threat?Wed, 22 Jul 2015 12:00:00 EDT<p>Seems like we hear every day about the latest cyber threats and that the world is falling apart. But is it true? Will these doomsday scenarios ever affect your business or is it just a concern for governments and big organizations? This session will dig into some attacks and what we can learn from them, providing some provocative thoughts for better risk management.</p>http://www.rsaconference.com/media/targeted-attacks-apts-cyberwar-a-mkt-buzz-or-a-real-business-threat
The Game Has ChangedWed, 22 Jul 2015 12:00:00 EDT<p>Based on the breaches of the past couple of years, it’s obvious that the way our industry has been doing security isn’t working. The adversary continues to get through even “next generation" defenses and what’s worse, too often they do so undetected for months or even years. As the perimeter continues to dissolve under the onslaught of mobile and cloud technologies, enterprises need to realize that the game has changed and that the only way to escape today’s vicious cycle of prevention and remediation is to change our mindset toward security operations.</p>http://www.rsaconference.com/media/the-game-has-changed
50 Minute InfoSec MBA, Part IIWed, 15 Jul 2015 12:00:00 EDT<p class="p1"><span class="s1">Our <a href="/events/us15/agenda/sessions/1693/the-50-minute-mba-for-information-security" target="_blank">2015 RSAC presentation</a> covered the educational pieces that make up the MBA, but at a very high level. We knew when we tackled the subject that fitting a two- to three-year degree into a 50-minute session would leave a lot of room for further discussion. For those ready to take the plunge, we’ll delve further into major subject areas, using a case study format to illustrate how the MBA skill set applies to information security professionals.</span></p>
<p class="p1"><span class="s1">During this RSA Conference webcast, you will:</span></p>
<ul>
<li>Dig in to the following subject areas: finance, marketing, and others</li>
<li>Apply the lessons to real-world scenarios</li>
<li>Walk away with a better understanding of how business skills make you a better information security professional</li>
</ul>
<p><a class="file pdf" href="/writable/files/50_min._mba_part_ii_final.pdf">Download the presentation.</a></p>http://www.rsaconference.com/media/50-minute-infosec-mba-part-ii
Quick Look: Security Risks in SDN and Other New Software AppsWed, 15 Jul 2015 12:00:00 EDT<p>More software - web 2.0, HTML5, Cloud, Mobile, and now IOT and SDN ... Today's number one cyber-risk is the least understood and least prevented; yet as more software is deployed, hackers continue to find new ways to attack via our software apps, to steal our data and money, to disrupt or hijack our systems. We look at some new advanced cyber risks regarding SDN and ICS-IOT in particular.</p>http://www.rsaconference.com/media/quick-look-security-risks-in-sdn-and-other-new-software-apps
Quick Look: Effective Partnerships - Security and Privacy in Smart CitiesThu, 09 Jul 2015 12:00:00 EDT<p>Effective cyber security requires that governments, private companies, and NGOs work together to understand threats in cyberspace, and to share information and capabilities for mitigating them. With the burgeoning ‘Smart City’ development in Asia, this becomes even more pertinent. Without this collaboration, national and economic security would be in jeopardy.</p>http://www.rsaconference.com/media/quick-look-effective-partnerships-security-and-privacy-in-smart-cities
Quick Look: The Enemy You KnowWed, 08 Jul 2015 12:00:00 EDT<p>Most organizations consider the insider threat a single type of actor, when it is a grouping of several distinct adversary types. A variety of defenses must be deployed in order to be effective against the different types. This session will articulate the different types of adversaries through case study analysis and provide attendees with actionable tactics to effectively defend against each type.</p>http://www.rsaconference.com/media/quick-look-the-enemy-you-know
Quick Look: You’ve Done Everything Right, and Still There’s a Breach. Now What?Tue, 07 Jul 2015 12:00:00 EDT<p>The drumbeat of newspaper headlines trumpeting the next big data breach shows how precarious even the best of cyber defenses are. The companies did everything they were supposed to do, and still lost their data. It’s clear that the cybersecurity playbook needs to be rewritten. Leveraging insights from a wide swath of IT professionals, this presentation will cover some of the key elements that need to be in our new playbook.</p>http://www.rsaconference.com/media/quick-look-youve-done-everything-right-and-still-theres-a-breach-now-what
Quick Look: Nation State & Hacktivist Attacks - Targeted Hits on Asian OrganizationsMon, 06 Jul 2015 12:00:00 EDT<p>Asian organizations are more frequently targeted by advanced threat actors than their western counterparts. Why? This session will share our latest detailed findings--including previously unreleased research--about types of companies targeted, techniques being used by nation state and hacktivist actors, among others, and how your organization can avoid becoming a victim.</p>http://www.rsaconference.com/media/quick-look-nation-state-hacktivist-attacks-targeted-hits-on-asian-organizations
Quick Look: 2015 Industrial Control Systems Vulnerability TrendsThu, 02 Jul 2015 12:00:00 EDT<p>This session is the result of a yearlong study of the most recent ICS/SCADA vulnerabilities that affected industrial control systems and critical infrastructure. The study includes root cause analysis, attack vector scrutiny, consequence of successful attack and finally remediation guidance for the same.</p>http://www.rsaconference.com/media/quick-look-2015-industrial-control-systems-vulnerability-trends
Quick Look: Security Lessons Learned - Enterprise Adoption of Cloud ComputingThu, 02 Jul 2015 12:00:00 EDT<p>Jim Reavis provides insight into the experiences of several large enterprises as they have made the journey into the cloud. Jim discusses the challenges, opportunities and solutions to provide assurance in the cloud, how enterprises are managing risks in the cloud today, the problems that remain for industry to solve and highlights the efforts undertaken by CSA to build the trust in the cloud.</p>http://www.rsaconference.com/media/security-lessons-learned-enterprise-adoption-of-cloud-computing
APJ 2015 Keynote Sneak Peek - Zak EbrahimWed, 01 Jul 2015 12:00:00 EDT<p>Watch this excerpt from an interview with Zak Ebrahim, Author of The Terrorist's Son: A Story of Choice and Nonviolence Advocate and Lecturer, in advance of <a href="http://www.rsaconference.com/events/ap15/agenda/sessions/2102/the-terrorists-son-a-story-of-choice" target="_blank">his keynote session</a> at RSA Conference Asia Pacific & Japan 2015 in Singapore.</p>http://www.rsaconference.com/media/apj-2015-keynote-sneak-peek-zak-ebrahim
Quick Look: ShadowOS - Modifying the Android OS for Mobile Application TestingTue, 30 Jun 2015 12:00:00 EDT<p>Most penetration testers know the headaches of testing mobile applications. Challenges like certificate pinning and wondering what files are being written to the device while the app is in use. Since Android is open source, you create your own custom OS that takes the guess work out of your assessment. By doing this, you can monitor HTTP/HTTPS traffic, SQL Lite queries, file access and more.</p>
<p>ShadowOS is a new, free tool from HP Fortify on Demand - stay tuned for more details to be announced the week of RSA Conference Asia Pacific & Japan 2015!</p>http://www.rsaconference.com/media/shadowos-modifying-the-android-os-for-mobile-application-testing